XFER has been serving Michigan since 1994, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.
2 minutes reading time (326 words)

Tip of the Week: A Secure 2018 Relies on Powerful Passwords

Tip of the Week: A Secure 2018 Relies on Powerful Passwords

Password security is one of the most important parts of using an online account. It seems that the average user runs into the paradox of password security by using either complex, hard-to-remember passwords, or simple and less-secure passwords that put their accounts at risk. Even if the user is aware of the benefits that come from using a secure password, chances are that they will sideline security in favor of ease of access.

According to a list of the worst passwords in 2017 compiled by Splashdata, some of the worst passwords included “password” and “123456.” These two have topped the list since at least 2010, when Splashdata made their debut survey. Other passwords included in the top five include “12345678,” “qwerty,” and “12345.” Even “starwars” made the list at #16. For further reference, you can view the list of the worst passwords in 2017 here.

Best practices for password security are relatively well-known, especially considering how many experts study this particular field. Here are some tips from the guidelines recommended by the United States Computer Emergency Readiness Team, or US-CERT. In fact, US-CERT was created by the Department of Homeland Security for the specific purpose of preserving online security against threats.

Some sites or applications force users to use these best practices when creating a password, so do yourself a favor and keep these in mind:

  1. Use different passwords on different systems and accounts.
  2. Don't use passwords that are based on personal information that can be easily accessed or guessed.
  3. Use a combination of capital and lowercase letters, numbers, and special characters.
  4. Don't use words that can be found in any dictionary of any language.
  5. Develop mnemonics (or spoken memory tricks) such as passphrases for remembering complex passwords.
  6. Consider using a password manager program to keep track of your passwords.

XFER is of the firm mind that you should never underestimate the importance of network security best practices--particularly password security. To learn more about how you can secure your business, reach out to us at 734-927-6666 / 800-Get-XFER.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Sunday, 27 May 2018
If you'd like to register, please fill in the username, password and name fields.

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Technology Tip of the Week Privacy Microsoft Internet Cloud Saving Money Best Practices Backup Software Managed Service Provider Workplace Tips Business Computing Small Business Hackers Google Hosted Solutions Mobile Office Data Productivity Hardware Mobile Devices VoIP Gadgets Quick Tips Email Malware IT Support Efficiency Network Social Media Business Management Business Continuity Business Server Virtualization Network Security Smartphones IT Services Miscellaneous Innovation Upgrade Windows Disaster Recovery Communication Microsoft Office Managed IT Services Users Communications Mobile Device Management Computer Android Passwords User Tips Marketing Smartphone Browser Holiday WiFi Alert Vendor Management Save Money Data Backup Windows 10 Remote Monitoring Ransomware Mobile Computing Cybercrime Operating System Avoiding Downtime Bring Your Own Device Computers Apple BYOD Information Technology Data Recovery Big Data Remote Computing VPN IT Solutions The Internet of Things Current Events Chrome Best Practice Outsourced IT History Telephone Systems Going Green Cloud Computing Firewall Internet of Things Trending Phone System Wireless Technology Application Health Collaboration BDR Router IT Consultant Hacking Automation Social Engineering Spam Employer-Employee Relationship Printer Office Budget Lithium-ion Battery Bandwidth Cybersecurity Excel Proactive IT App Facebook Two-factor Authentication Mobility iPhone Business Managament Artificial Intelligence Recovery Fax Server Content Filtering Managed IT Services Maintenance Windows 8 Money Tech Term How To Business Intelligence User Error Humor Phishing Analytics Customer Relationship Management Outlook Hard Drives Tutorials Mouse Data Protection Virus Managed IT Value Data Security Website Apps Private Cloud Redundancy Networking Law Enforcement Gmail PowerPoint Unified Threat Management Antivirus Saving Time Retail Windows 10 Downtime Memory Google Drive Inbound Marketing Network Congestion Conferencing Vulnerability Administration Search Save Time Tablet Mobile Device Identity Theft Twitter Office Tips Digital Payment Social Networking Tech Support Computer Repair Data Management Streaming Media Risk Management Compliance Flexibility Office 365 Productivity CES Leadership Spam Blocking Administrator Running Cable Smart Tech Settings IT Plan Wireless Physical Security Intranet Environment Cleaning Computer Accessories Wearable Technology Human Resources Public Cloud SaaS Biometrics IT service Training Unsupported Software Infrastructure OneNote Data storage Hacker Social Best Available Update Bluetooth Webinar Internet Exlporer People Data Storage eWaste Word Touchscreen Comparison PDF Samsung Robot Safety Wi-Fi Sports Work/Life Balance Data Breach HaaS End of Support Government Online Currency Meetings Recycling Document Management Workers Point of Sale Video Surveillance Statistics Credit Cards Scam DDoS Data loss IT Management Solid State Drive Entertainment Piracy Black Market Programming IBM Encryption Skype Chromecast Law Firm IT Access Control Consultant Frequently Asked Questions Fraud Distributed Denial of Service Files Company Culture Patch Management Instant Messaging Screen Mirroring PC Care Workforce Augmented Reality 360 Emails Professional Services Google Apps Password Electronic Medical Records Cameras 3D Lifestyle Content Filter Scheduling Flash Fiber-Optic Notifications LinkedIn eBay Software as a Service Content Management Laptop Authentication Business Owner Licensing Tip of the week Amazon Colocation Net Neutrality Windows 10s File Sharing Insurance Charger Cast WIndows 7 Alerts Telecommuting SharePoint Windows 8.1 Update Virtual Reality Tools Shadow IT Hiring/Firing Printer Server Shortcut Display Storage HIPAA IT Support Sync Cables Hybrid Cloud Analysis Text Messaging Blockchain Touchpad Debate Nanotechnology User Windows Server 2008 Amazon Web Services IaaS Computing Infrastructure Worker Commute Legal Practices Computer Care Managing Stress Domains Work Station Software Tips Remote Work Relocation Hosted Solution Bloatware Gaming Console Password Manager Help Desk Monitor Addiction Keyboard Science Telephony Unified Communications Accountants Google Docs Staff Connectivity USB Windows 7 Online Shopping Audit Business Mangement YouTube Hosted Computing Netflix Entrepreneur Botnet Root Cause Analysis Data Warehousing Specifications Reputation Cache Tablets Start Menu Theft Windows Media Player Virtual Desktop Voice over Internet Protocol Digital Signature IT Security Education Devices Supercomputer Hiring/Firing Regulations Evernote Internet exploMicrosoft Computer Fan Travel Criminal NarrowBand Print Server Inventory HBO Cost Management Crowdfunding IoT Millennials Customers Remote Support Wireless Internet Upgrades Analyitcs Webcam Mobile Cortana Macro Uninterrupted Power Supply nternet FENG Customer Service Multi-Factor Security Strategy Applications Thought Leadership Knowledge Servers Wireless Charging Co-managed IT Advertising Scalability Assessment Rootkit Wire Politics How to Television Transportation Techology Troubleshooting Webinar Automobile Public Computer Benefits IT solutions Employer Employee Relationship CrashOverride Thank You Smart Technology Loyalty Books Experience Congratulations Battery Content Two Factor Authentication Video Games Emergency Worker Music Audiobook

Sign up for our Newsletter!

  • Company Name *
  • First Name *
  • Last Name *